Authentication -security component, JAVA Programming

Assignment Help:

Authentication is basically an identification step.

Functionality used for J2EE security:

Principal: An entity that may be authenticated and identified.

Principal name: Identity of a principal like user id and password.

Credential: Information like certificate or password, which may authenticate a principal.

Subject: A set of rules and their credentials associated with a thread of execution.

Authentication: The steps by which a server verifies the identity represented by a user through certificate or username/userid and password. E.g: the password and username supplied by the user may be checked against a database server or an LDAP server to verify he is whom he claims to be.

Authentication methods:

Basic/Digest authentication: Browser password and specific is encoded using Base-64 encoding.Digest is same to basic but shielded the password through encryption. This is a simple challenge- respond scheme where the client is challenged for a password and user id. The Internet is broken into realms. 

Form-based authentication: Most Web applications give  the  form-based authentication since it allows applications to modifies the authentication interface. Uses base64 encoding, which may expose password and username unless all connections are over SSL.

Certificate based authentication: Uses SSL and PKI. This is by far the most secured authentication function. A user must give x.509 certificate to verify with the server.

 


Related Discussions:- Authentication -security component

JAVA IF/ ELSE, #This assignment will give you practice with interactive pro...

#This assignment will give you practice with interactive programs, if/else statements and methods that return values. You are to write a program that prompts the user for informati

What are the kinds of computer network among nodes, What are the kinds of c...

What are the kinds of computer network according to the distance among nodes? the kinds of computer network according to the distance among nodes are as follows: There are t

Exportobject of unicastremoteobject do, What does the exportObject of Unica...

What does the exportObject of UnicastRemoteObject do? Ans) Exports the remote object to make it available to receive incoming calls, using the certain supplied port. If port not

Clean up for java programs, You have recently joined a games company. The S...

You have recently joined a games company. The SQA manager has given you the task of improving the code quality of simple games. This is a standard task which the SQA manager gives

What is the purpose to use the enableevents method, What is the purpose to ...

What is the purpose to use the enableEvents() method?

How many bits are used to show unicode and ascii, How many bits are used to...

How many bits are used to show Unicode, ASCII, UTF-16, and UTF-8 characters? Unicode requires 16 bits and ASCII require 7 bits although the ASCII character set uses only 7 bits

JDI, i need help

i need help

A talent agency program , class Writer extends Client {    // additional m...

class Writer extends Client {    // additional members    private boolean technical = false;    private boolean government = false;    private boolean international = false;    pri

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd